CVE-2020-7729

HIGH

grunt <1.3.0 - RCE

Title source: llm
STIX 2.1

Description

The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.

Scores

CVSS v3 7.1
EPSS 0.0242
EPSS Percentile 85.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-1188
Status published
Products (4)
canonical/ubuntu_linux 18.04
debian/debian_linux 9.0
gruntjs/grunt < 1.3.0
npm/grunt 0 - 1.3.0npm
Published Sep 03, 2020
Tracked Since Feb 18, 2026